0:00
The 72-minute gap, what the breaches, the vendors, and the messaging are actually telling
0:26
I look at the intersection of business, technology, and messaging regularly through
0:34
three lenses, how organizations are running their operations and security programs, how
0:40
vendors and innovations are reshaping the market, and how language influences the decisions
0:45
that executives and practitioners actually make.
0:49
How fast are AI-driven cyberattacks and can security programs keep up?
1:09
The short answer, attackers are operating in minutes and most defenders are not.
1:14
AI-driven cyberattacks now move from initial access to data exfiltration in as little
1:19
as 72 minutes, a four times acceleration over the prior year, according to the Unit 42-20-26
1:27
Global Incident Response Report.
1:30
Meanwhile, only 6% of organizations have fully deployed agentic AI in their security operations,
1:37
even though 92% say AI helps their teams review more events.
1:42
Information events and responding at machine speed are fundamentally different capabilities.
1:48
That gap is where breaches live.
1:51
February 2026 proved it, Japan Airlines disclosed unauthorized access to customer data spanning
2:00
Win resorts lost government-issued IDs to ransomware.
2:06
The Amarit, a company trusted to verify identities, leaked 1 billion records.
2:11
The University of Mississippi Medical Center had to close clinics and cancel procedures.
2:17
Substack, flicker, crunch base, and Malaysia Airlines all reported incidents in the same
2:24
The thread connecting these was not sophisticated tradecraft.
2:28
It was credential reuse, ungoverned third-party access, and peripheral systems nobody was
2:34
monitoring, gaps in visibility, not gaps in technology.
2:38
Unit 42's data makes it stark.
2:41
65% of initial access is now identity driven, with social engineering, stolen credentials,
2:48
and IAM misconfigurations as the primary entry points.
2:53
Identity weaknesses played a role in nearly 90% of all incidents investigated, and the institutional
2:59
backstop is weakening.
3:01
SESA has lost nearly 30% of its workforce since early 2025, dropping from about 3400 to
3:12
The Surseya Final Rule is delayed until May 2026.
3:17
The Cybersecurity Information Sharing Act has expired.
3:21
For every CISO trying to build a program that connects detection to response to business
3:27
continuity, the question to the board is
3:30
If the federal infrastructure we relied on is diminished, what is our plan?
3:35
But here is what makes this moment different from the last decade of we are losing the
3:40
arms race headlines.
3:42
Some organizations are closing the gap and closing it fast.
3:47
In a recent conversation on the redefining cybersecurity podcast, industry analyst Richard
3:53
Steyannon, former Gartner VP, and founder of IT Harvest, described a CISO at a large
4:00
enterprise who has already eliminated the entire SOC team, not downsized, eliminated,
4:07
replaced by AI-driven SOC automation that triages 100% of alerts, builds cases, investigates
4:15
threats, and executes containment, 24-7 at machine speed for a fraction of the cost of
4:21
a human-staffed operation.
4:23
That is not a vendor pitch.
4:25
It is an operational reality that changes the math for every security program still staffing
4:33
If one organization can do it, the question for every other CISO becomes, what is the cost
4:41
Steyannon framed it bluntly.
4:43
If a 90-day proof-of-concept costs $15,000 and your SOC budget over that same period
4:50
is $1,000,000, every quarter you delay is a quarter of budget you do not get back.
4:56
The workforce gap is 4.8 million globally.
5:00
The breach tempo is accelerating.
5:03
The programs that close the 72-minute gap will not do it by hiring faster.
5:08
They will do it by rethinking what humans are for and what machines should own.
5:13
Which vendor moves are actually changing the market?
5:17
Form consolidation is accelerating, but the most disruptive shift may not be coming from
5:22
the platform vendors at all.
5:25
Every major cybersecurity vendor is telling the same story.
5:29
Consolidate with us, reduce complexity, get unified visibility.
5:33
The question, CISOs, should be asking is whether the platform solves the operational problem
5:40
they have today or sells them a vision while their program struggles with basics.
5:45
Colorado Networks posted $2.6 billion in Q2 revenue, but missed Q3 earnings guidance,
5:53
with shares dropping 7% on integration costs from its $25 billion cyber arc acquisition.
6:00
Crowdstrike told a different story, net new ARR, up 73% year over year, extending Falcon
6:08
through a single agent architecture with targeted acquisitions of Seraphic Security and SGNL
6:14
that avoid heavy integration overhead.
6:16
The M and A signal is impossible to ignore.
6:20
Google closed its $32 billion whiz acquisition with EU approval.
6:25
SIR raised $400 million at a $9 billion valuation.
6:30
Vectra acquired netography to unify observability and detection.
6:34
The consolidation is real.
6:36
But underneath the platform wars, a different market is forming.
6:40
IT Harvest now tracks 375 AI security vendors, almost all founded since 2022.
6:48
Of those, 58 are focused specifically on SOC automation, not SIEM vendors adding features,
6:57
but purpose-built startups replacing the SOC staffing model entirely.
7:02
Collectively, they have received over $1.3 billion in funding.
7:07
Many of these companies launched in early 2025 and reached $1 million in ARR within months.
7:13
By year end, several had hit $3 million in ARR for a product category that barely existed
7:22
Steinen's assessment is direct.
7:24
By this time next year, tracking AI security as a standalone category will no longer make
7:30
sense because every vendor will be an AI security vendor.
7:35
That is a market structure claim, not a feature claim.
7:39
And it has implications beyond the SOC.
7:42
Agentec AI, autonomous systems that make decisions without continuous human oversight,
7:49
landed at the top of Gartner's 2026 cybersecurity trends.
7:53
Forrester predicts it will cause a public breach this year.
7:57
That prediction already has a proof point.
8:00
A vulnerability dubbed claw jacked in OpenClaw showed that a malicious website could hijack
8:05
a locally running AI agent through its core gateway.
8:09
No plugins or user error required.
8:12
Traditional identity and access management was never designed for machine actors that spin
8:17
up dynamically, retain persistent credentials, and operate outside human governance life cycles.
8:25
Gartner data shows 57% of employees use personal gene AI for work, with 33% uploading sensitive
8:32
data to unsanctioned tools.
8:36
Enterprise management associates calls this the triple threat, agentec risk, identity governance
8:42
deficits, and a visibility gap most organizations have not begun to address.
8:47
The trust question is not abstract.
8:50
As I explored with CNN on the podcast, if SOC automation tools are consuming your logs,
8:57
your alerts, and your environment data, how much of that is flowing through public models?
9:03
His answer is that most serious vendors are running models locally or using privacy
9:08
preserving approaches like federated learning with fully homomorphic encryption, keeping
9:13
data encrypted even during processing.
9:16
The privacy infrastructure is maturing alongside the automation capability, but the question
9:22
every CISO should be asking their vendors right now is, where does my data go and who else
9:29
How is the industry's own language getting in the way?
9:33
When buzzwords replace operational specificity, organizations lose the ability to measure
9:40
Resilience is the dominant frame across every major analyst report and vendor keynote
9:47
The World Economic Forum's 2026 Global Cybersecurity Outlook is built around it.
9:53
Gartner's trends emphasize it, forester's predictions assume it, the shift from prevent
9:59
everything to prepare for the inevitable is healthy, but resilience without definition
10:05
becomes a permission structure for mediocrity.
10:09
Resilience to what?
10:10
Over what time frame?
10:11
If recovery takes three days and the attacker moved in 72 minutes, that is not resilience,
10:18
it is damage control.
10:21
Ask the patients in Mississippi whose procedures were canceled.
10:25
The bigger messaging problem may be the gap between what the technology can now do and
10:30
how the industry talks about it.
10:32
Stianne posted his SOC automation research on LinkedIn and described the response.
10:37
Half the comments defaulted to, but you need human in the loop.
10:42
And what about controls?
10:44
The conservative security reflexes that have defined the profession for decades.
10:49
That instinct is understandable.
10:51
It is also increasingly expensive.
10:53
AI model intelligence is growing by roughly 10 times per year.
10:58
The industry's language and its planning assumptions are still linear.
11:03
And the conversation is about whether to trust an autonomous system.
11:07
And the system is doubling in capability every few months.
11:11
The risk, calculus, changes faster than most governance frameworks can accommodate.
11:16
The board's CSO communication gap reinforces this.
11:21
The IANS and Artico 2026 benchmark report found that 95% of CSOs deliver regular board
11:30
updates, but only 30% of boards describe the relationship as strong and collaborative.
11:37
Nearly half of directors say CSO reporting on evolving threats needs improvement.
11:44
The world economic forum data reveals a parallel disconnect.
11:49
CEOs rank fraud and fishing as their top concern while CSOs rank ransomware.
11:56
In the board and the security leader are telling different stories about primary risk.
12:01
The budget gets pulled in multiple directions without a clear operational anchor.
12:06
Meanwhile, the macro spending numbers keep climbing.
12:09
$244 billion globally in 2026.
12:17
With managed services growing fastest at 11.1%, because organizations cannot hire fast enough
12:24
to run their own SOCs.
12:27
Cyber insurers are demanding evidence of specific controls before issuing policies,
12:33
becoming an unofficial compliance mechanism.
12:36
And in an industry spending a quarter of a trillion dollars this year,
12:39
the hardest question is not whether we have enough technology.
12:43
It is whether we are honest about the gap between the story we tell and the outcomes we deliver.
12:48
The language matters because it shapes what gets funded and what gets measured.
12:53
When a vendor says platform, a buyer should hear, consolidate everything with me.
13:00
When an analyst says resilience, a CISO should ask resilient enough to do what in the first 72 minutes.
13:08
When a security leader says we need human in the loop, press for which decisions at what speed and at what cost.
13:16
And when a policymaker says back on mission, press with what resources 72 minutes.
13:24
That is the story your program needs to tell.
13:28
If this analysis is useful, whether you are a CISO evaluating your program,
13:34
a vendor shaping go-to-market strategy, a product marketer cutting through noise,
13:39
or an analyst mapping the landscape, I would welcome the conversation.
13:46
Connect the dots between business operations, the technology that serves them,
13:51
and the market forces that shape both.
13:53
Reach out at SeanMartin.com and subscribe to Lens4,
13:58
where business, innovation, and messaging come into focus.